Cisco Blogs

Cisco Blog > Data Center

Enhancing the Splunk experience with Cisco UCS

According to scientists, the age of smartphones has left humans with such a short attention span that even a goldfish can hold a thought for longer. On an average, human attention span has fallen from 12 seconds in year 2000 to 8 seconds in today’s smart-world.

What does this mean for Splunk Enterprise ? Read More »

Tags: , , , , , , , , ,

Intelligent InSites and CMX Make a Difference for Today’s Healthcare

A CMX Partner Ecosystem Blog

Ecosystem partners are an important adjunct to Cisco Connected Mobile Experience (CMX). They augment the analytic and customer engagement capabilities of the solution with innovative business outcomes. This blog is one in a series that will highlight several of our CMX Ecosystem Partners. Today—Intelligent InSites.

Intelligent InSites provides products and services that enhance the interoperability of healthcare IT systems, empowering staff with the right information at the right moment. By applying logic and location to clinical equipment, patients, and staff, the healthcare system can improve workflow and maximize patient satisfaction by optimizing equipment usage and staffing. Intelligent InSites drives value to healthcare systems by offering three primary products:


Locate: By providing real-time visibility into the current location of mobile medical equipment and staff, Locate enables caregivers to spend less time searching and more time delivering care.

Asset Optimization: By delivering insights into the utilization of assets, Asset Optimization enables healthcare organization to better use what they have and avoid unnecessary purchases or rentals.

Ambulatory: By providing an instant view of Read More »

Tags: , , , , , ,

Cognitive Threat Analytics – Transparency in Advanced Threat Research

Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer’s networks by means of advanced statistical analysis, machine learning and global correlation in Cisco security cloud. Attached to Cloud Web Security (CWS) and Web Security Appliances (WSA), it is also capable of integrating the non-Cisco data sources in order to help the broadest possible set of clients.

Our team discovers tens of thousands of ongoing malware infections (aka breaches) per day. These findings are delivered in a customer-specific report or directly into customer’s SIEM system. The customers can easily identify and re-mediate breaches, get to the root cause and apply policy changes that minimize the risk of further infections in the future. Read More »

Tags: , ,

Drones: Just Buzz or Real Business?

“Why Cisco?” I was asked repeatedly after speaking on a panel about drones. “Why not Cisco?” was my passionate response.

Drone 1The occasion was the recent NASA UTM Convention at Silicon Valley’s historic Moffett Field to explore creative traffic management solutions for Unmanned Aircraft Systems (UAS), popularly known as drones. At Cisco, we see a full spectrum of public, enterprise and consumer opportunities, as well as an amazing ecosystem of partners evolving around “connected” drones. This isn’t just buzz, but a real business opportunity.

After all, drones capture and transmit “ungodly amounts of data,” as Cisco’s Helder Antunes noted during his keynote session and CNBC interview. Cisco’s network backbone, solutions and applications enable the Internet of Everything (IoE) – the connection of people, processes, data and things – and drones represent important, mobile, data-rich nodes on the network. Please also read Helder’s blog on drones and the IoE here.

drone 2When it comes to drones and many other remotely connected and mobile devices, it’s really all about Collaboration, Cloud, Fog Computing – and Analytics, whether at the edge, across the network or in the cloud. To seamlessly transform raw data from sensors and images into actionable insights, an end-to-end platform is needed to optimally capture, store, share and process data most anywhere.

For example, one of the biggest challenges for drone operations today is to efficiently collect and effectively transfer colossal amounts of data over weak or non-existent network links in remote areas. Many times, these processes take days or weeks before the collected data can be processed and meaningful insights can be derived.

High-value crops such as grapes may suffer significant business losses due to such time-lagged decisions. Again, what’s needed is the connection to a reliable, high-speed platform. Cisco’s hardware and software technologies enable virtually real-time decision making without experts having to physically download and tackle the data deluge challenge on-site.

drone 3

Precision Agriculture, Safety & Security and Field Asset Inspection are some verticals that could immensely benefit by leveraging unmanned aircrafts due to their unique abilities to navigate in complex remote environments.

At the NASA event, Angelo Fienga of Cisco Italy and I demonstrated an interesting use case of how one can utilize Cisco’s collaboration infrastructure to unleash “remote expert” capabilities using drones. We successfully exhibited that by relaying the live camera feed of the drone over to WebEx and TelePresence infrastructure, allowing an agronomist thousands of miles away across the globe to precisely observe, guide and control data collection operation in the field.

drone 4

So all this and more is why “Cisco and drones” make a lot of sense. I’m excited about the possibilities here, and will share some more ideas during my keynote address at the upcoming InterDrone conference in Las Vegas from Sep 9-11, 2015.  I hope to see you there.

Meantime, what applications do you think are better suited for a drone business?

Tags: , , , , , , , , , , , ,

Making the Right Connections Opens New Doors to Digital Business Success

Making the Right Connections Opens New Doors to Digital Business Success

The digital transformation of business isn’t just about the connection of things, though those connections are certainly important.  Industrial or IT automation can take many forms, whether it’s connections between people, the connections between people and things or, perhaps most importantly, the processes that that enable connections of all kinds to happen quickly and intelligently. Without order, digital business transformation runs the risk of becoming digital chaos.   What’s most essential in every case is creating the desired business outcome.

Hyper-Distribution: Billions of Connections Shouldn’t Mean Billions of Headaches

But connecting all these things isn’t easy.  50 billion things are projected to be connected to the Internet by 2020. Along with this hyper-distribution of things also comes the hyper-distribution of data.  No longer is data only found in large centralized warehouses – it is being dynamically captured and acted upon at the edge of the network to respond to events in real time.

Organizations are struggling with the management of business processes in this expanding, hyperconnected world. Value chains are increasingly global, yet the decisions that need to be made are becoming increasingly local — and they need to be made in real-time.  Hyper-distribution is fragmenting traditional business processes. Dealing with this growing complexity was identified as the number one IoT management challenge in a 2014 business study.

Not surprisingly, companies are being forced to re-imagine their processes and many are turning to software to turn what is being imagined into business reality.  And they are calling upon new forms of automation and analytics to do it. Real business transformation will only occur when things connect with both people and process to turn information into actionable intelligence.  Automation facilitates the new connections.  Analysis gives the connections new meaning. Da Vinci instructs us, “Simplicity is the ultimate sophistication.”  Finding ways to make the increasingly complex world of hyperconnectivity both simple to understand and simple to implement is the ultimate challenge for the networking industry.

What do I mean by hyper-distributed business process? Let’s take a look Read More »

Tags: , , , , , , , , ,